| /src/crypto/krb5/src/lib/krb5/krb/ |
| H A D | preauth_pkinit.c | 42 krb5_responder_pkinit_identity **identities; member 63 for (i = 0; data->identities[i] != NULL; i++) in get_one_challenge() 66 data->identities[i] = k5alloc(sizeof(*data->identities[i]), &data->err); in get_one_challenge() 67 if (data->identities[i] == NULL) in get_one_challenge() 69 data->identities[i]->identity = strdup(key); in get_one_challenge() 70 if (data->identities[i]->identity == NULL) { in get_one_challenge() 74 data->identities[i]->token_flags = token_flags; in get_one_challenge() 106 chl->identities = k5calloc(n_ids + 1, sizeof(chl->identities[0]), &ret); in krb5_responder_pkinit_get_challenge() 107 if (chl->identities == NULL) in krb5_responder_pkinit_get_challenge() 112 get_one_challenge_data.identities = chl->identities; in krb5_responder_pkinit_get_challenge() [all …]
|
| /src/crypto/krb5/src/plugins/preauth/pkinit/ |
| H A D | pkinit_identity.c | 684 pkinit_set_deferred_id(pkinit_deferred_id **identities, in pkinit_set_deferred_id() argument 693 ids = *identities; in pkinit_set_deferred_id() 711 *identities = out; in pkinit_set_deferred_id() 747 pkinit_find_deferred_id(pkinit_deferred_id *identities, in pkinit_find_deferred_id() argument 752 for (i = 0; identities != NULL && identities[i] != NULL; i++) { in pkinit_find_deferred_id() 753 if (strcmp(identities[i]->identity, identity) == 0) in pkinit_find_deferred_id() 754 return identities[i]->password; in pkinit_find_deferred_id() 764 pkinit_get_deferred_id_flags(pkinit_deferred_id *identities, in pkinit_get_deferred_id_flags() argument 769 for (i = 0; identities != NULL && identities[i] != NULL; i++) { in pkinit_get_deferred_id_flags() 770 if (strcmp(identities[i]->identity, identity) == 0) in pkinit_get_deferred_id_flags() [all …]
|
| H A D | pkinit.h | 319 (pkinit_deferred_id **identities, const char *identity, 322 (pkinit_deferred_id *identities, const char *identity); 324 (pkinit_deferred_id *identities, const char *identity); 325 void pkinit_free_deferred_ids(pkinit_deferred_id *identities);
|
| /src/crypto/openssl/doc/man3/ |
| H A D | OSSL_DISPATCH.pod | 43 Available function identities and corresponding function signatures are 45 Furthermore, the chosen function identities and associated function
|
| H A D | OSSL_ALGORITHM.pod | 39 This string is a colon separated set of names / identities, and is used by 43 Multiple names / identities allow a specific algorithm implementation to be 45 known identities:
|
| H A D | X509_get_subject_name.pod | 77 can be set. For details on setting X509_ACERT holder identities, see
|
| H A D | SSL_set_quic_tls_cbs.pod | 118 established. The I<prot_level> argument identities the TLS protection level and
|
| /src/contrib/wpa/hostapd/ |
| H A D | hostapd.eap_user | 33 # method is using known prefix in identities (e.g., EAP-SIM and EAP-AKA). This 34 # is only allowed for phase 1 identities. 82 # Wildcard for all other identities
|
| /src/usr.bin/ssh-copy-id/ |
| H A D | ssh-copy-id.sh | 56 keys="$(ssh-add -L | grep -v 'The agent has no identities.')$nl$keys"
|
| /src/crypto/openssl/doc/internal/man3/ |
| H A D | OSSL_METHOD_STORE.pod | 51 Numeric identities are expected to be an algorithm identity for the methods. 53 these numeric identities accordingly.
|
| /src/crypto/openssl/ssl/statem/ |
| H A D | extensions_srvr.c | 1309 PACKET identities, binders, binder; in tls_parse_ctos_psk() local 1327 if (!PACKET_get_length_prefixed_2(pkt, &identities)) { in tls_parse_ctos_psk() 1333 for (id = 0; PACKET_remaining(&identities) != 0; id++) { in tls_parse_ctos_psk() 1338 if (!PACKET_get_length_prefixed_2(&identities, &identity) in tls_parse_ctos_psk() 1339 || !PACKET_get_net_4(&identities, &ticket_agel)) { in tls_parse_ctos_psk()
|
| /src/crypto/krb5/src/windows/installer/wix/ |
| H A D | msi-deployment-guide.txt | 528 Specifies the Default AllowAutoRenew value for new identities. 535 If '0', new identities will not be pinned to the display by default. 536 If '1', new identities will be pinned to the display by default. 685 Determines if addressless tickets will be obtained for new identities.
|
| /src/crypto/openssh/ |
| H A D | PROTOCOL.agent | 72 identities and, in particular, signature requests will check the key
|
| /src/crypto/openssl/ |
| H A D | NEWS.md | 558 IDENTIFIER sub-identities. ([CVE-2023-2650])
|
| H A D | CHANGES.md | 15597 specific names (called "system identities"). In the C code, these
|
| /src/contrib/llvm-project/llvm/lib/Target/ARM/ |
| H A D | ARMInstrInfo.td | 4810 // Alternate cases for PKHBT where identities eliminate some nodes. 4827 // Alternate cases for PKHTB where identities eliminate some nodes. Note that
|
| H A D | ARMInstrThumb2.td | 3389 // Alternate cases for PKHBT where identities eliminate some nodes. 3418 // Alternate cases for PKHTB where identities eliminate some nodes. Note that
|
| /src/crypto/krb5/src/include/krb5/ |
| H A D | krb5.hin | 6785 krb5_responder_pkinit_identity **identities;
|